He gives C-sieves on the CSIDH

From MaRDI portal
Publication:2119021

DOI10.1007/978-3-030-45724-2_16zbMath1492.81043OpenAlexW2964369789MaRDI QIDQ2119021

Chris Peikert

Publication date: 23 March 2022

Full work available at URL: https://doi.org/10.1007/978-3-030-45724-2_16




Related Items (39)

SoK: how (not) to design and implement post-quantum cryptographyCSIDH on the SurfaceTowards post-quantum security for signal's X3DH handshakeAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniablePost-quantum key-blinding for authentication in anonymity networksPost-quantum adaptor signature for privacy-preserving off-chain paymentsFully projective radical isogenies in constant-timeSafe-error attacks on SIKE and CSIDHAn efficient post-quantum KEM from CSIDHGroup signatures and more from isogenies and lattices: generic, simple, and efficientPractical post-quantum signature schemes from isomorphism problems of trilinear formsOn the Security of OSIDHSéta: Supersingular Encryption from Torsion AttacksSHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDHSCALLOP: scaling the CSI-FiShGeneric models for group actionsDisorientation faults in CSIDHA lower bound on the length of signatures based on group actions and generic isogeniesCandidate trapdoor claw-free functions from group actions with applications to quantum protocolsFull quantum equivalence of group action DLog and CDH, and more\textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twist\( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key spaceOptimizing quantum space using spooky pebble gamesDeCSIDH: delegating isogeny computations in the CSIDH settingKey-oblivious encryption from isogenies with application to accountable tracing signaturesMR-DSS -- smaller MinRank-based (ring-)signaturesOn actively secure fine-grained access structures from isogeny assumptionsAttack on SHealS and HealS: the second wave of GPSTPost-quantum asynchronous deniable key exchange and the signal handshakeTwo remarks on the vectorization problemCryptographic group actions and applicationsCalamari and Falafl: logarithmic (linkable) ring signatures from isogenies and latticesOblivious pseudorandom functions from isogeniesFurther optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectorsGroup signatures and more from isogenies and lattices: generic, simple, and efficientOne-way functions and malleability oracles: hidden shift attacks on isogeny-based protocolsAn efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniableA fusion algorithm for solving the hidden shift problem in finite abelian groups\textsf{CSI-RAShi}: distributed key generation for CSIDH


Uses Software


Cites Work


This page was built for publication: He gives C-sieves on the CSIDH